标签:
是否启动检查 linux-xen02:~ # /etc/init.d/ipmi status ipmi_msghandler module loaded. ipmi_si module loaded. ipmi_devintf module loaded. /dev/ipmi0 exists. linux-datastore:~ # lsmod |grep ipmi ipmi_devintf 17509 0 ipmi_si 53294 0 ipmi_msghandler 49895 2 ipmi_devintf,ipmi_si linux-datastore:~ # lsmod |grep ipmi|wc -l 电源操作 linux-xen02:~ # ipmitool chassis Chassis Commands: status, power, identify, policy, restart_cause, poh, bootdev, bootparam, selftest raw Send a RAW IPMI request and print response i2c Send an I2C Master Write-Read command and print response spd Print SPD info from remote I2C device lan Configure LAN Channels chassis Get chassis status and set power state power Shortcut to chassis power commands event Send pre-defined events to MC mc Management Controller status and global enables sdr Print Sensor Data Repository entries and readings sensor Print detailed sensor information fru Print built-in FRU and scan SDR for FRU locators gendev Read/Write Device associated with Generic Device locators sdr sel Print System Event Log (SEL) pef Configure Platform Event Filtering (PEF) sol Configure and connect IPMIv2.0 Serial-over-LAN tsol Configure and connect with Tyan IPMIv1.5 Serial-over-LAN isol Configure IPMIv1.5 Serial-over-LAN user Configure Management Controller users channel Configure Management Controller channels session Print session information sunoem OEM Commands for Sun servers kontronoem OEM Commands for Kontron devices picmg Run a PICMG/ATCA extended cmd fwum Update IPMC using Kontron OEM Firmware Update Manager firewall Configure Firmware Firewall delloem OEM Commands for Dell systems shell Launch interactive IPMI shell exec Run list of commands from file set Set runtime variable for shell and exec hpm Update HPM components using PICMG HPM.1 file ekanalyzer run FRU-Ekeying analyzer using FRU files 管理信息级别 linux-xen01:~ # ipmitool channel Channel Commands: authcap <channel number> <max privilege> getaccess <channel number> [user id] setaccess <channel number> <user id> [callin=on|off] [ipmi=on|off] [link=on|off] [privilege=level] info [channel number] getciphers <ipmi | sol> [channel] Possible privilege levels are: 1 Callback level 2 User level 3 Operator level 4 Administrator level 5 OEM Proprietary level 15 No access 新增用户 linux-xen01:~ # ipmitool user set name 10 dcloud linux-xen01:~ # ipmitool user set password 10 dcloud linux-xen01:~ # ipmitool user enable 10 linux-xen01:~ # ipmitool user priv 10 4 1 linux-xen01:~ # ipmitool user list 1 ID Name Callin Link Auth IPMI Msg Channel Priv Limit 2 root true true true ADMINISTRATOR 10 dcloud true false true ADMINISTRATOR 设置IP ipmitool lan set 1 ipaddr 192.168.70.222 设置网关 ipmitool lan set 1 defgw ipaddr 192.168.70.254 arp -s 192.168.0.10 78:2b:cb:65:75:31 开启lan 1 可访问 ipmitool lan set 1 access on 如果远程访问可以,但不能使用本地的地址因为-H hostname Remote host name for LAN interface, 也是说执行命令时,他能检测IP是否为远程地址,如果不是远程地址,则执行失败,如果是本地地址则直接执行即可 远程地址 linux-xen01:~ # ipmitool -I lan -H 192.168.70.224 -U root -P 123456 chassis power status Chassis Power is on linux-xen01:~ # ipmitool -I lan -H 192.168.70.222 -U root -P 123456 chassis power status Error: Unable to establish LAN session Unable to get Chassis Power Status linux-xen01:~ # 本机 linux-xen01:~ # ipmitool chassis power status Chassis Power is on linux-xen01:~ # 检查是否安装IPMI linux-datastore:~ # lsmod |grep ipmi linux-datastore:~ # /etc/init.d/ipmi start Starting ipmi drivers: done linux-datastore:~ # linux-datastore:~ # lsmod |grep ipmi ipmi_devintf 17509 0 ipmi_si 53294 0 ipmi_msghandler 49895 2 ipmi_devintf,ipmi_si linux-datastore:~ # lsmod |grep ipmi|wc -l 3 配置IP和网关 ipmitool lan set 1 ipaddr 192.168.60.222 设置IP ipmitool lan set 1 defgw ipaddr 192.168.60.254 设置网关 linux-xen01:~ # ipmitool lan set usage: lan set <channel> <command> <parameter> LAN set command/parameter options: ipaddr <x.x.x.x> Set channel IP address netmask <x.x.x.x> Set channel IP netmask macaddr <x:x:x:x:x:x> Set channel MAC address defgw ipaddr <x.x.x.x> Set default gateway IP address defgw macaddr <x:x:x:x:x:x> Set default gateway MAC address bakgw ipaddr <x.x.x.x> Set backup gateway IP address bakgw macaddr <x:x:x:x:x:x> Set backup gateway MAC address password <password> Set session password for this channel snmp <community string> Set SNMP public community string user Enable default user for this channel access <on|off> Enable or disable access to this channel alert <on|off> Enable or disable PEF alerting for this channel arp respond <on|off> Enable or disable BMC ARP responding arp generate <on|off> Enable or disable BMC gratuitous ARP generation arp interval <seconds> Set gratuitous ARP generation interval vlan id <off|<id>> Disable or enable VLAN and set ID (1-4094) vlan priority <priority> Set vlan priority (0-7) auth <level> <type,..> Set channel authentication types level = CALLBACK, USER, OPERATOR, ADMIN type = NONE, MD2, MD5, PASSWORD, OEM ipsrc <source> Set IP Address source none = unspecified source static = address manually configured to be static dhcp = address obtained by BMC running DHCP bios = address loaded by BIOS or system software cipher_privs XXXXXXXXXXXXXXX Set RMCP+ cipher suite privilege levels X = Cipher Suite Unused c = CALLBACK u = USER o = OPERATOR a = ADMIN O = OEM
标签:
原文地址:http://www.cnblogs.com/heidsoft/p/4279974.html